<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 08:04:11 +0000</lastBuildDate>
    <item>
      <title>1f72da3f-3352-4e42-8a85-fd826afaf0b4</title>
      <link>https://vulnerability.circl.lu/sighting/1f72da3f-3352-4e42-8a85-fd826afaf0b4/export</link>
      <description>{"uuid": "1f72da3f-3352-4e42-8a85-fd826afaf0b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://t.me/cvedetector/18445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52902 - IBM Cognos Controller Hardcoded Database Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52902 \nPublished : Feb. 19, 2025, 3:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T17:54:23.000000Z"}</description>
      <content:encoded>{"uuid": "1f72da3f-3352-4e42-8a85-fd826afaf0b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://t.me/cvedetector/18445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52902 - IBM Cognos Controller Hardcoded Database Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52902 \nPublished : Feb. 19, 2025, 3:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T17:54:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1f72da3f-3352-4e42-8a85-fd826afaf0b4/export</guid>
      <pubDate>Wed, 19 Feb 2025 17:54:23 +0000</pubDate>
    </item>
    <item>
      <title>5306fab2-d61f-4022-a0c7-ebc1c51b3e69</title>
      <link>https://vulnerability.circl.lu/sighting/5306fab2-d61f-4022-a0c7-ebc1c51b3e69/export</link>
      <description>{"uuid": "5306fab2-d61f-4022-a0c7-ebc1c51b3e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52905\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user.\n\ud83d\udccf Published: 2025-03-10T16:05:13.550Z\n\ud83d\udccf Modified: 2025-03-10T16:31:09.992Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185264", "creation_timestamp": "2025-03-10T16:38:03.000000Z"}</description>
      <content:encoded>{"uuid": "5306fab2-d61f-4022-a0c7-ebc1c51b3e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52905\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user.\n\ud83d\udccf Published: 2025-03-10T16:05:13.550Z\n\ud83d\udccf Modified: 2025-03-10T16:31:09.992Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185264", "creation_timestamp": "2025-03-10T16:38:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5306fab2-d61f-4022-a0c7-ebc1c51b3e69/export</guid>
      <pubDate>Mon, 10 Mar 2025 16:38:03 +0000</pubDate>
    </item>
    <item>
      <title>5636657b-5421-45af-bb3b-822b06f4a36d</title>
      <link>https://vulnerability.circl.lu/sighting/5636657b-5421-45af-bb3b-822b06f4a36d/export</link>
      <description>{"uuid": "5636657b-5421-45af-bb3b-822b06f4a36d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/cvedetector/19967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52905 - IBM Sterling B2B Integrator Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52905 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:32.000000Z"}</description>
      <content:encoded>{"uuid": "5636657b-5421-45af-bb3b-822b06f4a36d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/cvedetector/19967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52905 - IBM Sterling B2B Integrator Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52905 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5636657b-5421-45af-bb3b-822b06f4a36d/export</guid>
      <pubDate>Mon, 10 Mar 2025 19:02:32 +0000</pubDate>
    </item>
    <item>
      <title>99d8ef96-9641-4744-b539-9cba5c23f0fb</title>
      <link>https://vulnerability.circl.lu/sighting/99d8ef96-9641-4744-b539-9cba5c23f0fb/export</link>
      <description>{"uuid": "99d8ef96-9641-4744-b539-9cba5c23f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzvlzd2e", "content": "", "creation_timestamp": "2025-03-10T19:45:49.964521Z"}</description>
      <content:encoded>{"uuid": "99d8ef96-9641-4744-b539-9cba5c23f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzvlzd2e", "content": "", "creation_timestamp": "2025-03-10T19:45:49.964521Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/99d8ef96-9641-4744-b539-9cba5c23f0fb/export</guid>
      <pubDate>Mon, 10 Mar 2025 19:45:49 +0000</pubDate>
    </item>
    <item>
      <title>03d80ed2-049f-41e5-9e60-fd2a54aaaf22</title>
      <link>https://vulnerability.circl.lu/sighting/03d80ed2-049f-41e5-9e60-fd2a54aaaf22/export</link>
      <description>{"uuid": "03d80ed2-049f-41e5-9e60-fd2a54aaaf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52903\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.\n\ud83d\udccf Published: 2025-05-01T22:15:48.366Z\n\ud83d\udccf Modified: 2025-05-01T22:15:48.366Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7232336", "creation_timestamp": "2025-05-01T23:17:59.000000Z"}</description>
      <content:encoded>{"uuid": "03d80ed2-049f-41e5-9e60-fd2a54aaaf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52903\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.\n\ud83d\udccf Published: 2025-05-01T22:15:48.366Z\n\ud83d\udccf Modified: 2025-05-01T22:15:48.366Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7232336", "creation_timestamp": "2025-05-01T23:17:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03d80ed2-049f-41e5-9e60-fd2a54aaaf22/export</guid>
      <pubDate>Thu, 01 May 2025 23:17:59 +0000</pubDate>
    </item>
    <item>
      <title>407396f7-18b4-4f7c-9e55-02c08e3fe0a8</title>
      <link>https://vulnerability.circl.lu/sighting/407396f7-18b4-4f7c-9e55-02c08e3fe0a8/export</link>
      <description>{"uuid": "407396f7-18b4-4f7c-9e55-02c08e3fe0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5q5chown2h", "content": "", "creation_timestamp": "2025-05-02T02:01:26.223732Z"}</description>
      <content:encoded>{"uuid": "407396f7-18b4-4f7c-9e55-02c08e3fe0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5q5chown2h", "content": "", "creation_timestamp": "2025-05-02T02:01:26.223732Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/407396f7-18b4-4f7c-9e55-02c08e3fe0a8/export</guid>
      <pubDate>Fri, 02 May 2025 02:01:26 +0000</pubDate>
    </item>
    <item>
      <title>86928197-42f7-4c22-887c-a6b73ab7afe6</title>
      <link>https://vulnerability.circl.lu/sighting/86928197-42f7-4c22-887c-a6b73ab7afe6/export</link>
      <description>{"uuid": "86928197-42f7-4c22-887c-a6b73ab7afe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/cvedetector/24293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52903 - IBM Db2 Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-52903 \nPublished : May 1, 2025, 11:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T03:23:40.000000Z"}</description>
      <content:encoded>{"uuid": "86928197-42f7-4c22-887c-a6b73ab7afe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/cvedetector/24293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52903 - IBM Db2 Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-52903 \nPublished : May 1, 2025, 11:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T03:23:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86928197-42f7-4c22-887c-a6b73ab7afe6/export</guid>
      <pubDate>Fri, 02 May 2025 03:23:40 +0000</pubDate>
    </item>
    <item>
      <title>179b7f48-d074-4858-9c57-3a964c15e400</title>
      <link>https://vulnerability.circl.lu/sighting/179b7f48-d074-4858-9c57-3a964c15e400/export</link>
      <description>{"uuid": "179b7f48-d074-4858-9c57-3a964c15e400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52900\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0 through 12.2.4 Fix Pack 5 and 12.0.0 through 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-06-28T00:59:23.758Z\n\ud83d\udccf Modified: 2025-06-28T00:59:23.758Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238163", "creation_timestamp": "2025-06-28T01:51:11.000000Z"}</description>
      <content:encoded>{"uuid": "179b7f48-d074-4858-9c57-3a964c15e400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52900\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0 through 12.2.4 Fix Pack 5 and 12.0.0 through 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-06-28T00:59:23.758Z\n\ud83d\udccf Modified: 2025-06-28T00:59:23.758Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238163", "creation_timestamp": "2025-06-28T01:51:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/179b7f48-d074-4858-9c57-3a964c15e400/export</guid>
      <pubDate>Sat, 28 Jun 2025 01:51:11 +0000</pubDate>
    </item>
    <item>
      <title>9dd9c4a1-703d-4d67-b7f9-e45f80097213</title>
      <link>https://vulnerability.circl.lu/sighting/9dd9c4a1-703d-4d67-b7f9-e45f80097213/export</link>
      <description>{"uuid": "9dd9c4a1-703d-4d67-b7f9-e45f80097213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsne2ph7g725", "content": "", "creation_timestamp": "2025-06-28T04:48:27.223896Z"}</description>
      <content:encoded>{"uuid": "9dd9c4a1-703d-4d67-b7f9-e45f80097213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsne2ph7g725", "content": "", "creation_timestamp": "2025-06-28T04:48:27.223896Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9dd9c4a1-703d-4d67-b7f9-e45f80097213/export</guid>
      <pubDate>Sat, 28 Jun 2025 04:48:27 +0000</pubDate>
    </item>
    <item>
      <title>7689fbb4-eda5-42b7-b229-3e655fdfcb20</title>
      <link>https://vulnerability.circl.lu/sighting/7689fbb4-eda5-42b7-b229-3e655fdfcb20/export</link>
      <description>{"uuid": "7689fbb4-eda5-42b7-b229-3e655fdfcb20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</description>
      <content:encoded>{"uuid": "7689fbb4-eda5-42b7-b229-3e655fdfcb20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7689fbb4-eda5-42b7-b229-3e655fdfcb20/export</guid>
      <pubDate>Mon, 25 Aug 2025 13:32:05 +0000</pubDate>
    </item>
  </channel>
</rss>
